diff --git a/advisories/unreviewed/2025/11/GHSA-4pqv-hw6c-g45v/GHSA-4pqv-hw6c-g45v.json b/advisories/unreviewed/2025/11/GHSA-4pqv-hw6c-g45v/GHSA-4pqv-hw6c-g45v.json index 26e3ef1ac6421..7401432ea2200 100644 --- a/advisories/unreviewed/2025/11/GHSA-4pqv-hw6c-g45v/GHSA-4pqv-hw6c-g45v.json +++ b/advisories/unreviewed/2025/11/GHSA-4pqv-hw6c-g45v/GHSA-4pqv-hw6c-g45v.json @@ -1,14 +1,40 @@ { "schema_version": "1.4.0", "id": "GHSA-4pqv-hw6c-g45v", - "modified": "2025-11-08T00:31:00Z", + "modified": "2025-11-08T00:31:01Z", "published": "2025-11-08T00:31:00Z", "aliases": [ "CVE-2025-63420" ], - "details": "A stored cross-site scripting (XSS) vulnerability in the CrushFTP 11.3.7_50 Admin Panel (Reports / 'Who Created Folder') allows authenticated attackers with permissions to create folders to inject malicious HTML/JavaScript.", - "severity": [], - "affected": [], + "summary": "CVE-2025-63420", + "details": "CrushFTP11 before 11.3.7_57 is vulnerable to stored HTML injection in the CrushFTP Admin Panel (Reports / \"Who Created Folder\"), leading to persistent HTMLi in admin sessions.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "CrushFTP" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": ">=11.3.7_57" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", @@ -24,8 +50,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-11-07T22:15:39Z"